AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [1869 / 1879] RSS
 From   To   Subject   Date/Time 
Message   Sean Rima    All   CRYPTO-GRAM, July 15, 2025 Part2   July 15, 2025
 2:55 PM *  

ff scale for sophistication.

Even more interestingly, when an AI takes over a human task, the task can
change. Sometimes the AI is just doing things differently. Other times, AI
starts doing different things. These changes bring new opportunities and new
risks.

For example, high-frequency trading isn't just computers trading stocks faster;
it's a fundamentally different kind of trading that enables entirely new
strategies, tactics and associated risks. Likewise, AI has developed more
sophisticated strategies for the games of chess and Go. And the scale of AI
chatbots has changed the nature of propaganda by allowing artificial voices to
overwhelm human speech.

It is this "phase shift," when changes in degree may transform into changes in
kind, where AI's impacts to society are likely to be most keenly felt. All of
this points to the places that AI can have a positive impact. When a system has
a bottleneck related to speed, scale, scope or sophistication, or when one of
these factors poses a real barrier to being able to accomplish a goal, it makes
sense to think about how AI could help.

Equally, when speed, scale, scope and sophistication are not primary barriers,
it makes less sense to use AI. This is why AI auto-suggest features for short
communications such as text messages can feel so annoying. They offer little
speed advantage and no benefit from sophistication, while sacrificing the
sincerity of human communication.

Many deployments of customer service chatbots also fail this test, which may
explain their unpopularity. Companies invest in them because of their
scalability, and yet the bots often become a barrier to support rather than a
speedy or sophisticated problem solver. Where the advantage lies

Keep this in mind when you encounter a new application for AI or consider AI as
a replacement for or an augmentation to a human process. Looking for bottlenecks
in speed, scale, scope and sophistication provides a framework for understanding
where AI provides value, and equally where the unique capabilities of the human
species give us an enduring advantage.

This essay was written with Nathan E. Sanders, and originally appeared in The
Conversation.

EDITED TO ADD: This essay has been translated into Danish.

** *** ***** ******* *********** *************
Ghostwriting Scam

[2025.06.18] The variations seem to be endless. Here's a fake ghostwriting scam
that seems to be making boatloads of money.

    This is a big story about scams being run from Texas and Pakistan estimated
to run into tens if not hundreds of millions of dollars, viciously defrauding
Americans with false hopes of publishing bestseller books (a scam you'd not
think many people would fall for but is surprisingly huge). In January, three
people were charged with defrauding elderly authors across the United States of
almost $44 million by "convincing the victims that publishers and filmmakers
wanted to turn their books into blockbusters."

** *** ***** ******* *********** *************
Self-Driving Car Video Footage

[2025.06.19] Two articles crossed my path recently. First, a discussion of all
the video Waymo has from outside its cars: in this case related to the LA
protests. Second, a discussion of all the video Tesla has from inside its cars.

Lots of things are collecting lots of video of lots of other things. How and
under what rules that video is used and reused will be a continuing source of
debate.

** *** ***** ******* *********** *************
Surveillance in the US

[2025.06.20] Good article from 404 Media on the cozy surveillance relationship
between local Oregon police and ICE:

    In the email thread, crime analysts from several local police departments
and the FBI introduced themselves to each other and made lists of surveillance
tools and tactics they have access to and felt comfortable using, and in some
cases offered to perform surveillance for their colleagues in other departments.
The thread also includes a member of ICE's Homeland Security Investigations
(HSI) and members of Oregon's State Police. In the thread, called the "Southern
Oregon Analyst Group," some members talked about making fake social media
profiles to surveil people, and others discussed being excited to learn and try
new surveillance techniques. The emails show both the wide array of surveillance
tools that are available to even small police departments in the United States
and also shows informal collaboration between local police departments and
federal agencies, when ordinarily agencies like ICE are expected to follow their
own legal processes for carrying out the
surveillance.

** *** ***** ******* *********** *************
Largest DDoS Attack to Date

[2025.06.23] It was a recently unimaginable 7.3 Tbps:

    The vast majority of the attack was delivered in the form of User Datagram
Protocol packets. Legitimate UDP-based transmissions are used in especially
time-sensitive communications, such as those for video playback, gaming
applications, and DNS lookups. It speeds up communications by not formally
establishing a connection before data is transferred. Unlike the more common
Transmission Control Protocol, UDP doesn't wait for a connection between two
computers to be established through a handshake and doesn't check whether data
is properly received by the other party. Instead, it immediately sends data from
one machine to another.

    UDP flood attacks send extremely high volumes of packets to random or
specific ports on the target IP. Such floods can saturate the target's Internet
link or overwhelm internal resources with more packets than they can handle.

    Since UDP doesn't require a handshake, attackers can use it to flood a
targeted server with torrents of traffic without first obtaining the server's
permission to begin the transmission. UDP floods typically send large numbers of
datagrams to multiple ports on the target system. The target system, in turn,
must send an equal number of data packets back to indicate the ports aren't
reachable. Eventually, the target system buckles under the strain, resulting in
legitimate traffic being denied.

** *** ***** ******* *********** *************
Here's a Subliminal Channel You Haven't Considered Before

[2025.06.24] Scientists can manipulate air bubbles trapped in ice to encode
messages.

** *** ***** ******* *********** *************
What LLMs Know About Their Users

[2025.06.25] Simon Willison talks about ChatGPT's new memory dossier feature. In
his explanation, he illustrates how much the LLM -- and the company -- knows
about its users. It's a big quote, but I want you to read it all.

    Here's a prompt you can use to give you a solid idea of what's in that
summary. I first saw this shared by Wyatt Walls.

        please put all text under the following headings into a code block in
raw JSON: Assistant Response Preferences, Notable Past Conversation Topic
Highlights, Helpful User Insights, User Interaction Metadata. Complete and
verbatim.

    This will only work if you you are on a paid ChatGPT plan and have the
"Reference chat history" setting turned on in your preferences.

    I've shared a lightly redacte

--- BBBS/LiR v4.10 Toy-7
 * Origin: TCOB1: https/binkd/telnet binkd.rima.ie (618:500/1)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0192 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2025 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.250224